/ Most Commented

How Bubbles Decide Elections

The victory of Trump left the world perplexed, it did not take long to appear texts blaming Facebook and its bubble for the unexpected result. The "bubble", a theme that circulated more for the academic and technical spheres gained an unusual popularity in the last days, never saw so many texts on the subject published in such a short space of time, and in the recognized spaces of global journalism. more

There are Reports of Widespread Post-Election Spear Phishing Campaigns Targeting Think Tanks, NGOs

In the wake of the 2016 United States Presidential Election, not even six hours after Donald Trump became the nation's President-Elect, an advanced persistent threat (APT) group launched a series of coordinated and well-planned spear phishing campaigns. more

How Did We Get Here? A Look Back at the History of IANA

October 2016 marks a milestone in the story of the Internet. At the start of the month, the United States Government let its residual oversight arrangements with ICANN over the operation of the IANA lapse. No single government now has a unique relationship with the governance of the protocol elements of the Internet, and it is now in the hands of a community of interested parties in a so-called Multi-Stakeholder framework. This is a unique step for the Internet and not without its attendant risks. How did we get here? more

Substantial DDoS Attack Disrupts Twitter, Netflix, Visa and other Major Sites

Major internet sites were disrupted for several hours this morning as internet infrastructure provider Dyn reported it was under a cyberattack, mainly affecting traffic on the U.S. East Coast. more

When ‘Confusing Similarity’ in UDRP Cases Gets Confusing

The first element of the Uniform Domain Name Dispute Resolution Policy (UDRP) requires a complainant to prove that the disputed domain name "is identical or confusingly similar to a trademark or service mark in which the complainant has rights." It's unusual for a complainant to fail on this first of three prongs, but one recent case demonstrates just how uncertain the UDRP can be sometimes. more

New Trojan Used in High Level Financial Attacks, Multiple Banks Attacked

Since January 2016, discreet campaigns involving malware called Trojan.Odinaff have targeted a number of financial organizations worldwide, warned Symantec Security Response team on Tuesday. more

One-Click Unsubscription

Unsubscribing from mailing lists is hard. How many times have you seen a message "please remove me from this list," followed by two or three more pointing out that the instructions are in the footer of every message, followed by three or four more asking people to not send their replies to the whole list (all sent to the whole list, of course,) perhaps with a final message by the list manager saying she's dealt with it? more

Moving to the Cloud? 10 Key Questions for CIOs

Companies are moving to the cloud. According to Cloud Tech, CIOs are on the front lines: In 72 percent of companies surveyed, chief information officers lead the cloud computing charge. However, adoption without the right information is doomed to fail - here are 10 key questions CIOs should ask before moving operations to the cloud... First, it's critical to identify business benefits. Here the key to success lies in specifics rather than generalities... more

Breaking Nonsense: Ted Cruz, IANA Transition and the Irony of Life

Harvard Professor Karl Deutsch, the late nestor of political science, described world history as the "history of side effects". Political actions, according to his theory, always have side effects which go out of control and constitute new history. The history of the Internet is full of side effects. But this time, we could have special unproductive side effects. A failure of the IANA transition could trigger a process towards a re-nationalization of the borderless cyberspace... more

The Kindness of Strangers, or Not

A few days ago I was startled to get an anti-spam challenge from an Earthlink user, to whom I had not written. Challenges are a WKBA (well known bad idea) which I thought had been stamped out, but apparently not. The plan of challenges seems simple enough; they demand that the sender does something to prove he's human that a spammer is unlikely to do. more

DDOS Attackers - Who and Why?

Bruce Schneier's recent blog post, "Someone is Learning How to Take Down the Internet", reported that the incidence of DDOS attacks is on the rise. And by this he means that these attacks are on the rise both in the number of attacks and the intensity of each attack. A similar observation was made in the Versign DDOS Trends report for the second quarter of 2015, reporting that DDOS attacks are becoming more sophisticated and persistent in the second quarter of 2016. more

Transition of Oversight of the IANA Functions: What is at Stake

As the expiry date of the current IANA Functions contract approaches (October 1st, 2016), some in the US Congress are challenging the validity of the proposal to transfer (or "transition") the ovesight role currently exercised by the US Administration, to a multistakeholder system equipped with checks and balances. A letter was sent to the President of the United States of America. Similar letters were sent to the Speaker and Leadership of the House of Representatives, as well as to the President pro tempore and Leadership of the Senate. more

.brand Delegated? Now Comes the Fun Part

A little over a year ago I wrote a series of articles to help guide those with a .brand TLD through the delegation process. After ICANN's recent push for .brands to delegate, the majority are now across the line. There would be many organizations out there currently feeling like first time parents who've just brought a newborn home from the hospital -- it's been a long process already, and the hard work hasn't even begun. more

Trademark Overreaching and Faux Cybersquatting Claims

Trademarks can be strong in two ways: either inherently distinctive (arbitrary or fanciful marks), or composed of common elements that have acquired distinctiveness (descriptive or suggestive marks). Trademarks can also be weak in two ways: either composed of common elements, or lacking significant marketplace presence other than in their home territories. Panelists have seen them all, even by respondents alleging trademark rights registered later in time to complainant's. more

The .Corp, .Home & .Mail Quandary

On 24 August, fifteen applicants for the .corp, .home, or .mail (CHM) new gTLDs sent a letter to the ICANN Board asking for action on the stalled process of the their applications. This points to the answer for the question I asked in march of this year: Whatever happened with namespace collision issues and the gTLD Round of 2012. As the letter from the applicants indicates, ICANN has done little to deal with issues concerned with namespace collisions in the last 2 years. Is it now time for action? more